Advanced Search 
IEEE Security & Privacy
January/February 2006 (vol. 4 no. 1)
ISSN: 1540-7993
Table of Contents
From the Editors
Reviewer Thanks
Book Reviews
Interview
News
News Briefs (HTML)
Heather Drinan, I3P at Dartmouth College
Nancy Fontaine, I3P at Dartmouth College
Brent Kesler, I3P at Dartmouth College
pp. 14-16
Looking into Rootkits
Edward W. Felten, Center for Information Technology Policy, Princeton University
J. Alex Halderman, Center for Information Technology Policy, Princeton University
pp. 18-23
Host Security
John G. Levine, Georgia Institute of Technology
Julian B. Grizzard, Georgia Institute of Technology
Henry L. Owen, Georgia Institute of Technology
pp. 24-32
Cybercrime Analysis
Domain Name System
Online Gaming
John Black, University of Colorado
Martin Cochran, University of Colorado
Ryan Gardner, University of Colorado
pp. 46-52
Conference Reports
Christian Rechberger, Graz University of Technology, Austria
Vincent Rijmen, Graz University of Technology, Austria
Nicolas Sklavos, University of Patras, Greece
pp. 54-56
Education
On the Horizon
Virgil D. Gligor, University of Maryland
Tom Haigh, Cyber Defense Agency
Dick Kemmerer, University of California, Santa Barbara
Carl Landwehr, University of Maryland
Steve Lipner, Microsoft
John McLean, Naval Research Lab
pp. 62-69
Crypto Corner
Basic Training
Attack Trends
Building Security In
Emerging Standards
Ramaswamy Chandramouli, US National Institute of Standards and Technology
Scott Rose, US National Institute of Standards and Technology
pp. 84-87
Clear Text
Usage of this product signifies your acceptance of the Terms of Use.